ryantig / grepcidr
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks
☆27Updated last year
Alternatives and similar repositories for grepcidr:
Users that are interested in grepcidr are comparing it to the libraries listed below
- ☆30Updated 4 months ago
- ☆15Updated 3 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 11 months ago
- egrets monitors egress☆45Updated 5 years ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- ssh jump host appliance☆26Updated 3 years ago
- Library and example applications for using/abusing the information-leaky L2Trace service on Cisco switches. PSIRT Advisory: cisco-sa-2019…☆3Updated 2 years ago
- Use SQL to instantly query file, domain, URL and IP scanning results from VirusTotal.☆22Updated 2 weeks ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆51Updated 2 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Parser for Windows PowerShell script block logs☆13Updated 4 months ago
- THC "R U There" network discovery tool☆27Updated 5 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 weeks ago
- ☆15Updated 5 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆85Updated 7 months ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 7 months ago
- ☆48Updated 3 months ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Updated 6 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated last year
- ☆17Updated 4 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- This is a tool box for CIS Windows Hardening☆8Updated 8 months ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 3 years ago